commit | bae19af1075e34780c97bb352fc3fb318234902b | [log] [tgz] |
---|---|---|
author | Andrew Geissler <openbmcbump-github@yahoo.com> | Mon Jul 08 19:51:12 2019 +0000 |
committer | Brad Bishop <bradleyb@fuzziesquirrel.com> | Mon Jul 08 22:23:52 2019 -0400 |
tree | ecea45e602609e92d7556206ce4d36ce290900c1 | |
parent | 3f966dc22a5620c76e73b2a4ad601ccb1f0caaea [diff] |
meta-phosphor: ipmi-flash: add systemd targets phosphor-ipmi-flash installs three targets by default, this adds those installations. Each system that leverages phosphor-ipmi-flash will want to define their services to be installed by these three targets. The phosphor-ipmi-flash-bmc-prepare.target should have a service that clears caches or any other steps to prepare to receive an update image. The phosphor-ipmi-flash-bmc-verify.target should have a service that verifies the image's contents against a hash value provided. If a platform is using reboot-update, they don't need to provide an additional service for phosphor-ipmi-flash-bmc-update.target. Otherwise, this target should have service(s) that handle updating the BMC's firmware. This can mean, unpacking and installing the UBI tarball, or anything required. If the host is using phosphor-ipmi-flash to update the host bios, then via the host-bios package configuration option, you are provided an additional three targets: * phosphor-ipmi-flash-bios-prepare.target * phosphor-ipmi-flash-bios-verify.target * phosphor-ipmi-flash-bios-update.target These three targets are effectively the same uses as the BMC targets, but are triggered if one is sending data to the /flash/bios blob. phosphor-ipmi-flash: srcrev bump 33311b47b3..c9792e7536 Patrick Venture (9): build: prevent enabling aspeed and nuvoton build: drop --enable-pci-bridge option build: drop --enable-lpc-bridge option build: prevent enabling both static and ubi tarball build: install three targets to handle bmc updates bmc: only add verifyBlobId if data sent for image bmc: add ActionPack notion to bundle actions build: add option --enable-host-bios tools: add bios support (From meta-phosphor rev: a560e8e1f911f445500b42a5f3fd1c17adb37451) Signed-off-by: Patrick Venture <venture@google.com> Change-Id: Idb35a05279468745260085182a466776d9fe7d61 Signed-off-by: Brad Bishop <bradleyb@fuzziesquirrel.com>
The OpenBMC project can be described as a Linux distribution for embedded devices that have a BMC; typically, but not limited to, things like servers, top of rack switches or RAID appliances. The OpenBMC stack uses technologies such as Yocto, OpenEmbedded, systemd, and D-Bus to allow easy customization for your server platform.
sudo apt-get install -y git build-essential libsdl1.2-dev texinfo gawk chrpath diffstat
sudo dnf install -y git patch diffstat texinfo chrpath SDL-devel bitbake \ rpcgen perl-Thread-Queue perl-bignum perl-Crypt-OpenSSL-Bignum sudo dnf groupinstall "C Development Tools and Libraries"
git clone git@github.com:openbmc/openbmc.git cd openbmc
Any build requires an environment variable known as TEMPLATECONF
to be set to a hardware target. You can see all of the known targets with find meta-* -name local.conf.sample
. Choose the hardware target and then move to the next step. Additional examples can be found in the OpenBMC Cheatsheet
Machine | TEMPLATECONF |
---|---|
Palmetto | meta-ibm/meta-palmetto/conf |
Zaius | meta-ingrasys/meta-zaius/conf |
Witherspoon | meta-ibm/meta-witherspoon/conf |
Romulus | meta-ibm/meta-romulus/conf |
As an example target Palmetto
export TEMPLATECONF=meta-ibm/meta-palmetto/conf
. openbmc-env bitbake obmc-phosphor-image
Additional details can be found in the docs repository.
Commits submitted by members of the OpenBMC GitHub community are compiled and tested via our Jenkins server. Commits are run through two levels of testing. At the repository level the makefile make check
directive is run. At the system level, the commit is built into a firmware image and run with an arm-softmmu QEMU model against a barrage of CI tests.
Commits submitted by non-members do not automatically proceed through CI testing. After visual inspection of the commit, a CI run can be manually performed by the reviewer.
Automated testing against the QEMU model along with supported systems are performed. The OpenBMC project uses the Robot Framework for all automation. Our complete test repository can be found here.
Support of additional hardware and software packages is always welcome. Please follow the contributing guidelines when making a submission. It is expected that contributions contain test cases.
Issues are managed on GitHub. It is recommended you search through the issues before opening a new one.
Feature List
Features In Progress
Features Requested but need help
Dive deeper into OpenBMC by opening the docs repository.